StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Technology Investigation - Essay Example

Comments (0) Cite this document
Summary
I am investigating the application of Internet based technologies to design better learning platforms in the education industry. I will investigate a newer breed of web based learning management systems that is helping educational service providers offer a new, adaptive and holistic learning opportunity to users over the Internet.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Information Technology Investigation
Read TextPreview

Extract of sample "Information Technology Investigation"

Download file to see previous pages It usually doesn't include its own authoring capabilities; instead, it focuses on managing courses created by a variety of other sources." (An E-Learning Glossary, 2008)
E-learning has evolved along with the spread of the Internet, and today e-learning is one of the new innovations that are helping educators and administrators reach out to students across boundaries and time zones. E-learning has also ushered a new breed of entrepreneurs who are leveraging web based learning management systems to offer innovative, low cost and customized learning tools to students across the world. I was a part of an educational start up that offered a range of preparation tools for select international tests. I was a part of a small sub-team that analyzed the web based LMS landscaped and identified the most suitable LMS for the firm. Through this software investigation, I aim to identify the present trends in web-based LMS and e-learning. I also aim to identify the future evolution of e-learning.
A web based learning management system offers a holistic and all encompassing training and assessment set up that allows tutors and administrators to design, create, manage, deliver, adaptive, interactive and innovative online learning tools.
A web based learning management system creates a low cost yet highly effective learning and assessment environment that c...
In addition to this, a web based learning management system also offers both the user and the tutor the flexibility to create or access content at their discretion. Most e-learning software applications come with a administrator/admin module that lets the tutor easily create and upload content with a authoring tool and a web browser. A typical web based LMS system also has features that allow the tutor as well as the learner assess and monitor the learning, thereby making the learning process highly interactive and customized.
LMSs have evolved to be modular and they can often be integrated with other software applications like student information systems, online libraries and web analytics. This modularity and the ability to be integrated with other applications allows the administrator/decision maker utilize the data captured to design highly focused learning and assessment tools.
Despite the fact that e-learning and LMS is a relatively old phenomena, it is yet to mature and stabilize. The LMS landscape does not have a clear leader, and is still rapidly evolving. The future potential of LMSs is highly promising, and the LMS of future should be an open ended learning platform. While the present LMSs use in-house generated content and is primarily a tool to manage and track content usage, the LMS of future should be a flexible, adaptive environment that will be integrated with the greatest content depository- the internet. The truly futuristic LMS should be able to intelligently source content from the web and complement that content with content generated in-house and offer much better learning tools.
Business ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Investigation Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Information Technology Investigation Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/miscellaneous/1499183-information-technology-investigation
(Information Technology Investigation Essay Example | Topics and Well Written Essays - 1500 Words)
Information Technology Investigation Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/miscellaneous/1499183-information-technology-investigation.
“Information Technology Investigation Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/miscellaneous/1499183-information-technology-investigation.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Technology Investigation

Information Technology

...?Running head: Information Technology Information Technology Case Study Business Information Technology Table of Contents Case Study Business Information Technology 1 1.Introduction 3 Introduction 1 Section 1: Principle of ERP 3 Section 2: Principle of Scientific Management & Information Systems……………...6 Conclusions 8 References………………………………………………………………………………...9 1. Introduction Information Technology [IT] has changed the face of businesses all over the globe. No longer are businesses and their management pondering over heaps of paper to get a piece of information. IT has brought about changes galore where the principal areas are access to structured information in the form of data which has facilitated business managers to take stock...
9 Pages(2250 words)Essay

Information technology

...?Part - I Assume you have taken over responsibility to play the lead IT management role in Magnum Enterprises. Your boss, Rachel Heigl, is Magnum’s CIO. The IT management group is comprised of six people who you will be supervised. Ms. Heigl is an enlightened manager, and she believes that if you are to carry out your responsibilities effectively, you need to work with her in defining your IT management role. As a first step, she invites you to write a short statement where you describe what you see to be your role as head of the IT management effort at Magnum. The role of an Information Technology (IT) Manager varies with respect to the company; therefore, the IT Manager can be responsible for diverse areas of the information technology...
20 Pages(5000 words)Term Paper

Information Technology

...Analyze what Cloud and utility computing is in an IS context, and critically assess How they might lead to the IS department becoming both a means toempower employees and a value generator. Students ID no: Portsmouth, July 19, 2010 Table of Contents 1.0 Introduction Information systems (IS) are integral part of organisations for managing functions and processes of business units in dynamically evolving global competition. Technology architecture addresses the modus operandi of department handling the operation of Accounting and Financial, Human Resource Management, Sales and Order Management, Logistics and Supply Chain, Manufacturing, Inventory management, and Customer Relationship management (Luftman, Papp & Brier, 1999...
9 Pages(2250 words)Essay

Information Technology

... February 9, Information Technology Introduction The new information technology attention focuses on enhanced data transfer. The paper delves on different information technology updates. Information is grounded on how information is saved, transmitted and retrieved. The paper focuses on the strengths and weaknesses of the latest technology. Lastly, the paper discusses the advantages of one chosen information technology. Some of the latest information technologies enhance information transfer. Cloud Computing Many people have started to trust the cloud computing information technology. With the high demand for tablets and cell phone internet service, the cloud computing is a timely new technology. There are several cloud computing...
4 Pages(1000 words)Research Paper

The Widespread Use of Information Communication Technology

An increasing number of frauds is an example of an alarming situation. All these have a far-reaching impact on the employees, on businesses and on people. 

On the work front, the advantages of ICT cannot be overlooked in maintaining and implementing successful quality programs. Customer-driven standards, customer-supplier links, the prevention of error, quality at the source, and continuous improvement are some of the principles that are put into practice (Laudon & Laudon, 2000 cited by Iles & Healy, 2004). IC T facilitates the production process, helps meet benchmarking standards, make constant upgradation based on customer demands. The internet has revolutionized not just the selling of goods and services...
9 Pages(2250 words)Essay

Management Information System

At the beginning of the twentieth century, the revolution began in knowledge and information then accelerated gradually thereafter. It became now the foundation for many new services and products wherein 1974 applications pushed the limits of human ability. As an information system, research advanced so did user expectations. And the question raised is how individuals, the organization can adjust in order to leverage the delivery of information technology.

The infrastructure of the information technology (IT) affords the base for an organization to construct its information system needed to complete the work and provide the employee with all the necessary information. However, management decisions regarding IT are very...
12 Pages(3000 words)Assignment

Dental Veneers as a Breakthrough in Modern Dental Technology

In today’s fashion-conscious world, porcelain and composite veneers remain some of the most popular choices for people seeking to improve the esthetics of their teeth. Porcelain veneers have several advantages when compared to composite veneers including durability, resistance to staining, and amount of tooth structure removed during the procedure.
First and foremost, the porcelain veneers are very durable. They are also very thin – usually between 0.5 - 0.7 millimeters – and brittle, although once bonded to a healthy tooth structure they can become quite strong. The bonding process increases durability and veneers made of porcelain can last for many years, oftentimes between 10-15 years depending on how wel...
8 Pages(2000 words)Term Paper

Investigation of the Transient Behaviour of Earthing Systems Subjected to High Impulse Currents

The effect of the transient voltages and currents on the earthing systems has a great influence on the performance and evaluation of the substation equipment against lightning overvoltage. While the characteristics of the earthing system under steady-state depends on the electrode design and soil prosperities alone, the characteristics of the earthing system under impulse currents depends on the magnitude and shape of the impulse current. The experimental setup for the impulse tests on earthing systems has been designed with an impulse generator, voltage and current transducers and different types of earthing systems. The impulse tests with impulse voltages ranging from 500 V to 4 kV have been carried out and the impulse resistanc...
136 Pages(34000 words)Dissertation

Info-Point: Marketing of New Touch Screen Information Technology

The development of the new Info-Point technology, a stand-alone information module designed to offer the public information on tourism, local shopping, weather, and transportation, has created the opportunity to successfully market these information technologies to different UK cities. The entire marketing concept is to establish self-service information centers that offer a wide variety of regional information, utilizing an easy-to-use touch screen methodology to cater to a broad mass market of consumers. 

Touch screen interface systems are becoming more and more common in the UK and abroad. During a pilot experiment using touch screen information technology, the automotive manufacturer Lexus piloted an informatio...
10 Pages(2500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Organisations in the Engineering and Technology Environment: Singapore Airlines

In those days, just three flights per week, to Kuala Lumpur, Ipoh, and Penang, were all that the people in Singapore were privileged to. There were very fast developments in the situation in a span of two decades. During this period, Singapore’s Kallang Airport gained international exposure and started making huge additions to its fleet. Soon after the birth of the Federation of Malaysia on February 1963, the Malayan Airlines came to be known as the Malaysian Airlines, and in 1966, it was renamed the Malaysian-Singapore Airlines. But, in 1972, fifteen years from the day it was founded, Singapore Airlines split up with Malaysian Airlines and acquired a separate identity.
This split, however, helped the airlines to take i...
10 Pages(2500 words)Case Study

Business Information Systems

...Club IT - Part Three of Phoenix BIS 219 Introduction to Business Information Systems Club IT – Part Three _________ _________ DATE ________ Table of Contents Table of Contents 2 Abstract 3 Overview 3 Business background 4 Current Technology Structure of Club IT 5 Problem Assessment 5 Club IT Business Goal and Strategy 6 Assessment of Needs 7 IT Solutions for Club IT 8 Decision Support Systems/ DSS 8 Customer Information System 8 Data Mining for Business Performance 9 Enterprise Resource Planning 10 Supply Chain Management 11 Customer Relationship Management 11 Conclusion 11 Bibliography 12 Abstract Club IT is a nightclub that is currently operating with the traditional technology structure. Club IT nightclub is most popular club in its...
8 Pages(2000 words)Case Study

Global Employee Information and Consultation: Replicating the European Model

...Global Employee Information and Consultation: Replicating the European Model INTRODUCTION The only way for the employees and their representatives to reach the level of multinational corporations is to create an effective transnational mechanism that facilitates consultation and information disclosure. The European model (EWC) is an example of an institution that intends to provide employees voice in the transnational arena. The information dissemination and consultation arrangement enable employee representatives to participate in discussing issues that pertains to their employment. However, there is a need to analyze whether EU style of legislating a mechanism shall be effective if replicated globally. The answer in part depends...
9 Pages(2250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Information Technology Investigation for FREE!

Contact Us